-
2 months after launch (March 18th), if sufficient data has been collected, conduct deep-dive analysis of Benefit finder pages. This includes looking at combined funnel to see where the main dropoff po…
-
DPI (Deep Packet Inspection) circumvention
DPI (Deep Packet Inspection) is a system of analysis and traffic filtering by packet content, as well as the accumulation of statistical data. Using this te…
-
## Description
As of today in OpenCTI, **malware analyses** can be run on more **observables** than supported by the STIX norm. Thoses **observables** are:
- domain name
- hostname
- url
When…
-
Hi,
Recently purchased a POD HD Desktop, the "black bean" one, and I tried to use the program with no luck.
So the main question is:
How can i Help?
I'm software developer, but never worke…
-
This is a series
- [ ] Circuit Breaking
- [ ] percentage routing traffic engineering - https://hackmd.io/EVSGXz3MQD6_P8LvXLN-BA?both
- [ ] metrics exposed by traffic analysis
- [ ] mTLS and iden…
-
### Description
By Tom's experiment engnet2-20240906_175600 (see details below),
it was performance-triaged that the following rate measurement logic could be more optimized:
[](https://perf.…
-
Today on an Italian cybersecurity blog is appeared an interesting article about de-anonymization over Tor net.
The article tell German Police (some specialized department) is able to unveil users b…
serrq updated
3 weeks ago
-
**Describe the bug**
First of all, I'm not sure how helpful it will be to open this issue in this repository or whether it should be handled by Azure Networking. However, I believe all AKS customers …
-
We're getting an error when running the RSS provider against the feed for Malware Traffic analysis:
http://www.malware-traffic-analysis.net/blog-entries.rss
It's the only feed we're currently having …
ghost updated
6 years ago
-
Ben made an awesome thing and I wanna use it to visualise and teach about network traffic analysis.
https://twitter.com/benjaminbenben/status/1354475531190853634?s=19
...that's as far as I've go…